- Confidentiality
- Integrity
- Availability
When a computer is the object of the crime it is the target. The perpetrator attacks the confidentiality, integrity, or availability of information or systems. Attacks on confidentiality can involve accessing sensitive information such as medical records, credit card numbers, or trade secrets. Attacks on integrity may involve the modification of information, or vandalism such as Web site defacement. Attacks on availability may result in denial of service, destruction of data, or degraded operations of the computer or network.